### [CVE-2016-2183](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2183) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20n%2Fa%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack. ### POC #### Reference - http://packetstormsecurity.com/files/142756/IBM-Informix-Dynamic-Server-DLL-Injection-Code-Execution.html - http://seclists.org/fulldisclosure/2017/Jul/31 - http://seclists.org/fulldisclosure/2017/May/105 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html - http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html - https://access.redhat.com/articles/2548661 - https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03765en_us - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312 - https://kc.mcafee.com/corporate/index?page=content&id=SB10197 - https://nakedsecurity.sophos.com/2016/08/25/anatomy-of-a-cryptographic-collision-the-sweet32-attack/ - https://sweet32.info/ - https://www.exploit-db.com/exploits/42091/ - https://www.oracle.com/security-alerts/cpuapr2020.html - https://www.oracle.com/security-alerts/cpujan2020.html - https://www.oracle.com/security-alerts/cpujul2020.html - https://www.oracle.com/security-alerts/cpuoct2020.html - https://www.oracle.com/security-alerts/cpuoct2021.html - https://www.tenable.com/security/tns-2016-20 #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/Artem-Salnikov/devops-netology - https://github.com/Artem-Tvr/sysadmin-09-security - https://github.com/Justic-D/Dev_net_home_1 - https://github.com/Kapotov/3.9.1 - https://github.com/Live-Hack-CVE/CVE-2016-2183 - https://github.com/ShAdowExEc/Nmap-based-batch-vulnerability-scanning - https://github.com/Vainoord/devops-netology - https://github.com/Valdem88/dev-17_ib-yakovlev_vs - https://github.com/Vladislav-Pugachev/netology-DevOps-dz_-14 - https://github.com/WiktorMysz/devops-netology - https://github.com/alexandrburyakov/Rep2 - https://github.com/alexgro1982/devops-netology - https://github.com/aous-al-salek/crypto - https://github.com/biswajitde/dsm_ips - https://github.com/bysart/devops-netology - https://github.com/catsploit/catsploit - https://github.com/dmitrii1312/03-sysadmin-09 - https://github.com/gabrieljcs/ips-assessment-reports - https://github.com/geon071/netolofy_12 - https://github.com/ilya-starchikov/devops-netology - https://github.com/jeffaizenbr/Cipher-TLS-removing-vulnerabilities-from-openvas - https://github.com/kampfcl3/lineBOT - https://github.com/kthy/desmos - https://github.com/mikemackintosh/ruby-qualys - https://github.com/nikolay480/devops-netology - https://github.com/odolezal/D-Link-DIR-655 - https://github.com/pashicop/3.9_1 - https://github.com/stanmay77/security - https://github.com/tanjiti/sec_profile - https://github.com/vitaliivakhr/NETOLOGY - https://github.com/yellownine/netology-DevOps - https://github.com/yurkao/python-ssl-deprecated